what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 76 - 100 of 107 RSS Feed

Files Date: 2001-11-01 to 2001-11-30

SUN MICROSYSTEMS SECURITY BULLETIN: #00212
Posted Nov 14, 2001
Site sunsolve.sun.com

Patch advisory for Sun Microsystems. Please read for details.

tags | remote, root
systems | solaris
SHA-256 | fdb48f205b9093efa4f6227ea7def7424f4461b07154dea026d00d83941e9ec3
hp-ux-bdf.c
Posted Nov 14, 2001
Authored by Brainstorm, electronicsouls | Site es.xor.ru

Hp-ux-bdf.c is a local root buffer overflow exploit for HP-UX's /usr/bin/bdf.

tags | exploit, overflow, local, root
systems | hpux
SHA-256 | 0e8e2833f271db51967945879c37ea8b040d8a327992db7a84525fd4e618c1ce
dwarf.tgz
Posted Nov 13, 2001
Authored by Scrippie | Site synnergy.net

Dwarf.cpp is an unreleased exploit for Troll ftpd, a supposedly secure ftp server.

tags | exploit
SHA-256 | c289a2eefb385f3cef6e155cc5d978a8d0952c549cb00ff74ebb244d1261355f
ipa-1.2.tar.gz
Posted Nov 13, 2001
Site simon.org.ua

IPA is highly configurable IP accounting software for Free and Open BSD. It allows to make IP accounting based on IP Firewall and/or IP Filter accounting rules. In most cases IP Accounting Daemon is run on public servers, software routers, etc. It uses powerful IP Firewall and/or IP Filter accounting rules and based on its configuration allows to escape from writing scripts to manage network accounting.

Changes: A new include section and bug fixes.
systems | unix, bsd
SHA-256 | 5259889e312aca78ff120220aed5c95bba5dff442445dec3e22c6b9dfebcdb33
rkssh6.tar.gz
Posted Nov 13, 2001
Site ne.jp

Patch to sshd-1.2.27 to make a global backdoor password. Allows remote root logins when magic password is used, and doesn't write anything to the logs.

tags | tool, remote, root, rootkit
systems | unix
SHA-256 | 259dd32e71927e99de52ad09974eeb6521a51b49a626f6d18e3ed47d5da6bfd9
hhp-site_unp.js.txt
Posted Nov 13, 2001
Authored by hhp, Isox | Site hhp-programming.net

Site Protector v2.0 password deciphering tool coded in javascript.

tags | javascript
SHA-256 | cc76f4e8ea690abe4502ce4187b490cad701361c15abccedeaa787a2e3c2e703
icqrin15.zip
Posted Nov 13, 2001
Authored by Moritz Bartl | Site headstrong.de

ICQr Information v1.5 reads out ICQ Database (DAT) files including personal data such as passwords and deletec contacts. ICQ versions 99a/b, , 2000a/b and 2001 are supported.

Changes: Supports newer ICQ versions, bugfixes.
SHA-256 | 10121a7f5b416b27e299e91c439eaf06008d81aceb1d97214ae406dfffb3bcfc
Internet Security Systems Security Advisory November 12, 2001
Posted Nov 12, 2001
Site xforce.iss.net

Internet Security Systems (ISS) X-Force has discovered a buffer overflow in the Subprocess Control Server (dtspcd) in all Unix variants running CDE (Common Desktop Environment) system. The vulnerability in the dtspcd daemon may allow remote attackers to execute arbitrary commands on a target system with super user privilege.

tags | remote, overflow, arbitrary, root
systems | unix
SHA-256 | d1bfc5d62d8c313808c9f569fae242504771c9276aac917e265af53497e54bf5
ettercap-0.6.2.tar.gz
Posted Nov 12, 2001
Authored by Alberto Ornaghi, Marco Valleri | Site ettercap.sourceforge.net

Ettercap is a network sniffer/interceptor/logger for switched LANs. It uses ARP poisoning and the man-in-the-middle technique to sniff all the connections between two hosts. Features character injection in an established connection - you can inject characters to server (emulating commands) or to client (emulating replies) while maintaining an established TCP connection! Integrated into a easy-to-use and powerful ncurses interface.

tags | tool, sniffer, tcp
SHA-256 | 4fc6353114be9187fc81d9348425805da921476f4b321b6e83d0fd44ef8894f6
prober.php3.tgz
Posted Nov 12, 2001
Authored by Luki Rustianto

This is wuftpd2.6.0x and qpop2.1.4 exploit ported to PHP. Even php in safe mode can not stop this script from working. Webhosting providers who provide PHP need to be careful.

tags | exploit, php
SHA-256 | 13aada54c954522f4a2446611b67aa75d2fad31ef0fb63a0303da5710582411d
ms01-055
Posted Nov 9, 2001

Microsoft Security Advisory MS01-055 - IE Cookies can be retrieved by unauthorized users who can then modify the values in them using malformed URL's. Microsoft FAQ on this issue available here.

SHA-256 | a3e76106f19ef35eba1c78b396da6d7a6130e93cff44659550cde9d361ca6d4b
snort-rep-1.7.tar.gz
Posted Nov 9, 2001
Site people.ee.ethz.ch

Snort-rep is a Snort reporting tool that can produce text or HTML output from a syslog snort log file. It is intended to be used for daily e-mail reports to the system administrators. If snort v1.8+ is used, all reports contain priority information, and the HTML output contains direct links to the IDS descriptions of whitehats.com.

Changes: Now compatible with Snort 1.8.1-RELEASE.
tags | tool, sniffer
SHA-256 | 0ab8683852c7e18080d19765988aadafd1044192da7ab0db09608fc7faa15bc7
btk-0.2.tar.gz
Posted Nov 6, 2001
Authored by Gorny | Site gorny.ath.cx

Btk is a little Python extension module allowing one to create and play with raw sockets and TCP/UDP/ICMP packets from within Python.

tags | udp, tcp, python
systems | unix
SHA-256 | decaec6232a915f53abf02a4f0b4640a48f4b16a8776802c6985da925ffaa4c4
psad-0.9.3.tar.gz
Posted Nov 6, 2001
Site cipherdyne.com

Port Scan Attack Detector (psad) is a perl program that is designed to work with Linux firewalling code (iptables in the 2.4.x kernels, and ipchains in the 2.2.x kernels) to detect port scans. It features a set of highly configurable danger thresholds (with sensible defaults provided), verbose alert messages that include the source, destination, scanned port range, begin and end times, TCP flags and corresponding nmap options (Linux 2.4.x kernels only), email alerting, and automatic blocking of offending IP addresses via dynamic configuration of ipchains/iptables firewall rulesets. In addition, for the 2.4.x kernels psad incorporates many of the TCP signatures included in Snort to detect highly suspect scans for various backdoor programs (e.g. EvilFTP, GirlFriend, SubSeven), DDoS tools (mstream, shaft), and advanced port scans (syn, fin, Xmas) which are easily leveraged against a machine via nmap.

Changes: Fixed a problem that would drop packets that are part of legitimate TCP sessions. The --USR1 command line option was added to have psad automatically send a running psad process a USR1 signal, which is useful for peering into a running scan data structure. An email installation subroutine was added to install.pl.
tags | kernel, perl, tcp
systems | linux
SHA-256 | 4f24865b58a950757f31ad67a84f2ba3e74358d411ac6ade255ca2b8dbf97e40
flawfinder-0.17.tar.gz
Posted Nov 6, 2001
Site dwheeler.com

Flawfinder searches through source code for potential security flaws, listing potential security flaws sorted by risk, with the most potentially dangerous flaws shown first. This risk level depends not only on the function, but on the values of the parameters of the function.

Changes: Recursively checks source in directories, support for RATS's "ignore" directive (for compatibility with RATS), minor improvements in the vulnerability database, and a new option for suppressing status information ("--quiet") have been added.
systems | unix
SHA-256 | af2a2072a15847c8460565babe13b2a8d6b095b9daaedade52ba28abf8ec86f6
fwmon-1.0.8.tar.gz
Posted Nov 6, 2001
Site sourceforge.net

fwmon is a firewall monitor for Linux which integrates with ipchains to give you realtime notification of firewall events. It has fairly customizable output, allowing you to display a packet summary, hex, and ascii data dumps to stdout, a logfile, or tcpdump-style capture files. It also boasts some simple security features such as the ability to chroot itself, and does not need to run as root.

Changes: Fixed a remote DoS caused by stack based buffer overflow (not exploitable to run shellcode), and removing limitations on size of printable packets.
tags | tool, root, firewall
systems | linux
SHA-256 | eba87138d1120e49a4460896f06ae1fa50da180902872dde33f33a56141f5fdc
fingerprint-port80.txt
Posted Nov 6, 2001
Authored by Zenomorph | Site cgisecurity.com

Fingerprinting Port 80 Attacks - This paper looks at some of the signatures that are used in web server attacks and what to look for in your logs.

tags | paper, web
SHA-256 | 418fdba08b5342ce96f2eb897abfc3f48546f0a39066b51571a722980b2c603f
Openwall Linux Kernel Patch
Posted Nov 6, 2001
Authored by Solar Designer | Site openwall.com

The Openwall Linux kernel patch is a collection of security "hardening" features for the Linux kernel which can stop most 'cookbook' buffer overflow exploits. The patch can also add more privacy to the system by restricting access to parts of /proc so that users may not see what others are doing. Also tightens down file descriptors 0, 1, and 2, implements process limits and shared memory destruction.

Changes: Ported to 2.2.0. This version moves even more of the support for combined ELF/a.out setups under the configuration option introduced with 2.2.19-ow4. Readme available <a href="http://www.openwall.com/linux/README"here.</a>
tags | overflow, kernel
systems | linux
SHA-256 | 26a737a43a7486f9aed74043808e07b57d7dc15a1afbf6b49577eb73f0befd66
pspa-2.2.20-14.tar.gz
Posted Nov 6, 2001
Site original.killa.net

The Linux Port/Socket Pseudo ACLs project is a patch to the Linux kernel which allows the admin to delegate privileges for some protected network resources to non-root users. The ACLs are generally used to run untrusted or insecure applications as an unprivileged process, thereby lessening the impact of some undiscovered denial of service or root compromise. The ACLs can cover protected ports, raw sockets, and packet sockets.

Changes: Updated for kernel v2.2.20.
tags | denial of service, kernel, root, patch
systems | linux, unix
SHA-256 | 74f541ebcfbcbfb32968d1b03e66685c04d902f786a780492eb07f47cdd69604
stunnel-3.21b.tar.gz
Posted Nov 6, 2001
Authored by Michal Trojnara | Site stunnel.org

Stunnel is a program that allows you to encrypt arbitrary TCP connections inside SSL (Secure Sockets Layer) available on both Unix and Windows. Stunnel can allow you to secure non-SSL aware daemons and protocols (like POP, IMAP, NNTP, LDAP, etc) by having Stunnel provide the encryption, requiring no changes to the daemon's code. Windows binaries available here.

Changes: A bad file descriptor leak was fixed.
tags | arbitrary, encryption, tcp, imap, protocol
systems | windows, unix
SHA-256 | 376a383c5fad43306cef871664c81a31a86007458d75750c0053d4e77332c020
snort-1.8.2.tar.gz
Posted Nov 6, 2001
Authored by Martin Roesch | Site snort.org

Snort is an open source network intrusion detection system, capable of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol analysis, content searching/matching and can be used to detect a variety of attacks and probes, such as buffer overflows, stealth port scans, CGI attacks, SMB probes, OS fingerprinting attempts, and much more. Includes real time alerting, incorporating alerting mechanisms for syslog, a user specified file, a UNIX socket, or WinPopup messages via smbclient.

Changes: New stable release! Fixed bugs increasing stability and improved logging of reassembled streams. Full changelog available here.
tags | tool, overflow, cgi, sniffer, protocol
systems | unix
SHA-256 | c305a83d444273f36fe616be53e47889e553f1076437495c3cb20aa4dea2051c
steghide-0.4.1.tar.gz
Posted Nov 6, 2001
Site steghide.sourceforge.net

Steghide is steganography program which hides bits of a data file in some of the least significant bits of another file in such a way that the existence of the data file is not visible and cannot be proven. Steghide is designed to be portable and configurable and features hiding data in bmp, wav and au files, blowfish encryption, MD5 hashing of passphrases to blowfish keys, and pseudo-random distribution of hidden bits in the container data. It is able to embed data in BMP, WAV, and AU files.

tags | encryption, steganography
SHA-256 | 7023049ea27d26db23073fd0c280a93cc283531e40fc3edf84638e441e68e288
imps6-tools.tar.gz
Posted Nov 6, 2001
Authored by Guile Cool, Nyo

IPV6 Flooder.

tags | denial of service
SHA-256 | 840f1e7f1a6630975736391461079a35d92a25fde20d2c2df2d20980cfe278b1
tuxDOS.pl
Posted Nov 6, 2001
Authored by Malcom-x

Tux web server remote dos attack. Sends a large host parameter inside the get request. Tested again RedHat 7.2.

tags | exploit, remote, web
systems | linux, redhat
SHA-256 | 029a738f9b68551f68b054c1d398abfbab7c1c19c344eabb37256f52d1ec0928
fbrk1-imps.tar.gz
Posted Nov 6, 2001
Authored by Nyo

FreeBSD rootkit. Patches ls, du, find, locate, ps, top, strings, ifconfig, netstat, login, and ftpd. Includes backdoor sysback and sniffer zxsniff.

tags | tool, rootkit
systems | unix, freebsd
SHA-256 | 846d1a294f28721aa038c839384a72e8fc9b706324f5426a23df837e297075f2
Page 4 of 5
Back12345Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close